From 93130a4b11fc1eab363baed7ad70db3f0cae2913 Mon Sep 17 00:00:00 2001 From: pe3zx Date: Tue, 2 Jan 2018 22:43:09 +0700 Subject: [PATCH] =?UTF-8?q?Add:=20Skeleton=20in=20the=20closet.=20MS=20Off?= =?UTF-8?q?ice=20vulnerability=20you=20didn=E2=80=99t=20know=20about?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index ddeb2f5..f17d118 100644 --- a/README.md +++ b/README.md @@ -154,6 +154,7 @@ My curated list of awesome links, resources and tools - [sam-b/windows_kernel_resources](https://github.com/sam-b/windows_kernel_resources) - [Sharks in the Pool :: Mixed Object Exploitation in the Windows Kernel Pool](http://srcincite.io/blog/2017/09/06/sharks-in-the-pool-mixed-object-exploitation-in-the-windows-kernel-pool.html) - [Signing Mimikatz](https://twitter.com/subTee/status/912769644473098240) +- [Skeleton in the closet. MS Office vulnerability you didn’t know about](https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about/) - [Starting with Windows Kernel Exploitation – part 1 – setting up the lab](https://hshrzd.wordpress.com/2017/05/28/starting-with-windows-kernel-exploitation-part-1-setting-up-the-lab/) - [Starting with Windows Kernel Exploitation – part 2 – getting familiar with HackSys Extreme Vulnerable Driver](https://hshrzd.wordpress.com/2017/06/05/starting-with-windows-kernel-exploitation-part-2/) - [Starting with Windows Kernel Exploitation – part 3 – stealing the Access Token](https://hshrzd.wordpress.com/2017/06/22/starting-with-windows-kernel-exploitation-part-3-stealing-the-access-token/)